Learn how to set up and use AWS PrivateLink to connect securely to Firebolt.
Firebolt supports AWS PrivateLink to help you securely access the Firebolt API without exposing traffic to the public internet. AWS PrivateLink enhances security, minimizes data exposure, and improves network reliability by keeping traffic within AWS. This guide shows you how to:
AWS PrivateLink for Firebolt is in public preview and available in all Firebolt regions.
Before setting up AWS PrivateLink, ensure you have the following:
After meeting the previous prerequisites, request AWS PrivateLink access using Firebolt’s user interface as follows:
endpointServiceId
. Save this information for configuration.After you have requested AWS PrivateLink on Firebolt’s user interface, login to AWS and configure a VPC endpoint as follows:
endpointServiceId
provided in the email from Firebolt’s support team in the previous step to request AWS PrivateLink access.In the previous code example, replace <PRIVATE_IP_OF_VPC_ENDPOINT>
with the private IP address of your newly created VPC endpoint network interface.
Configure your Firebolt service account with the PRIVATE_ONLY
connection preference to ensure it accesses Firebolt only through AWS PrivateLink and uses private APIs. A claim is a setting that defines how a connection behaves. The PRIVATE_ONLY
claim enforces private networking by restricting access to public endpoints.
Use the following code example inside the Develop Workspace in the Firebolt Workspace:
After configuring your VPC to use the Firebolt AWS PrivateLink endpoint, test connectivity using the endpoint URL provided by the Firebolt support team.
Use the following curl command to retrieve the private endpoint from your account:
If your service account has the PRIVATE_ONLY
claim, requests from that service account to any Firebolt public endpoint will fail.
When using the PRIVATE_ONLY
claim, requests to the private endpoint complete successfully if the traffic originates from an authorized AWS VPC endpoint with the necessary route tables, security group rules, and network access control lists to enable communication.
The following code example sends a SELECT 42
query to a Firebolt private API endpoint using curl
, authenticates with a bearer token, and returns a JSON response containing the query result:
Learn how to set up and use AWS PrivateLink to connect securely to Firebolt.
Firebolt supports AWS PrivateLink to help you securely access the Firebolt API without exposing traffic to the public internet. AWS PrivateLink enhances security, minimizes data exposure, and improves network reliability by keeping traffic within AWS. This guide shows you how to:
AWS PrivateLink for Firebolt is in public preview and available in all Firebolt regions.
Before setting up AWS PrivateLink, ensure you have the following:
After meeting the previous prerequisites, request AWS PrivateLink access using Firebolt’s user interface as follows:
endpointServiceId
. Save this information for configuration.After you have requested AWS PrivateLink on Firebolt’s user interface, login to AWS and configure a VPC endpoint as follows:
endpointServiceId
provided in the email from Firebolt’s support team in the previous step to request AWS PrivateLink access.In the previous code example, replace <PRIVATE_IP_OF_VPC_ENDPOINT>
with the private IP address of your newly created VPC endpoint network interface.
Configure your Firebolt service account with the PRIVATE_ONLY
connection preference to ensure it accesses Firebolt only through AWS PrivateLink and uses private APIs. A claim is a setting that defines how a connection behaves. The PRIVATE_ONLY
claim enforces private networking by restricting access to public endpoints.
Use the following code example inside the Develop Workspace in the Firebolt Workspace:
After configuring your VPC to use the Firebolt AWS PrivateLink endpoint, test connectivity using the endpoint URL provided by the Firebolt support team.
Use the following curl command to retrieve the private endpoint from your account:
If your service account has the PRIVATE_ONLY
claim, requests from that service account to any Firebolt public endpoint will fail.
When using the PRIVATE_ONLY
claim, requests to the private endpoint complete successfully if the traffic originates from an authorized AWS VPC endpoint with the necessary route tables, security group rules, and network access control lists to enable communication.
The following code example sends a SELECT 42
query to a Firebolt private API endpoint using curl
, authenticates with a bearer token, and returns a JSON response containing the query result: